A type of a
Trojan horse that is designed to provide the attacker with sensitive
data such as
passwords, credit card information, log files,
e-mail address or
IM contact lists. These Trojans can look for specific pre-defined data (e.g., just credit card information or passwords), or they could install a
keylogger and send all recorded keystrokes back to the attacker.
See also Trojan horse.